# SuperClaude Examples Cookbook 🍳 *A practical guide to real-world SuperClaude usage with hands-on examples* ## How to Use This Cookbook This cookbook is your **practical reference** for using SuperClaude effectively. Unlike comprehensive guides, this focuses entirely on **working examples** and **real scenarios** you can try immediately. **Structure:** - **Quick Examples** - One-liner commands for common tasks - **Development Scenarios** - Complete workflows for typical development situations - **Troubleshooting Scenarios** - Real problem-solving examples - **Advanced Patterns** - Complex multi-step workflows - **Command Combinations** - Effective flag and agent combinations - **Best Practices in Action** - Examples showing optimal SuperClaude usage **How to read this:** - 📋 **Copy-paste commands** - All examples are working commands you can use - 🎯 **Expected outcomes** - What you should see after running each command - 💡 **Why it works** - Brief explanation of the approach - ⚠️ **Gotchas** - Common issues and how to avoid them --- ## Quick Examples - Just Try These! 🚀 ### Essential One-Liners ```bash # Initialize and understand your project /sc:load # Load project context /sc:analyze . # Analyze entire project /sc:build # Smart build with auto-optimization # Development workflows /sc:implement user-auth # Create authentication system /sc:improve messy-file.js # Clean up code automatically /sc:troubleshoot "login not working" # Debug specific issues # Session management /sc:save --checkpoint # Save progress with analysis /sc:reflect --type completion # Validate task completion ``` ### Quick Analysis Commands ```bash # Security focus /sc:analyze src/auth --focus security --depth deep # Performance analysis /sc:analyze --focus performance --format report # Quick quality check /sc:analyze src/components --focus quality --depth quick # Architecture review /sc:analyze --focus architecture . ``` ### Rapid Development Commands ```bash # UI components (triggers Magic MCP + Frontend agent) /sc:implement dashboard component --type component --framework react # API development (triggers Backend agent + Context7) /sc:implement user management API --type api --safe # Full features (triggers multiple agents) /sc:implement payment processing --type feature --with-tests ``` --- ## Development Scenarios 📋 ### Scenario 1: New Team Member Onboarding **Situation**: New developer joining project, needs to understand codebase and setup development environment. **Step-by-step workflow:** ```bash # 1. Initialize session and load project context /sc:load --deep --summary # 🎯 Expected: Comprehensive project analysis with structure, tech stack, and key components # 2. Understand architecture and dependencies /sc:analyze --focus architecture # 🎯 Expected: System design overview, dependency mapping, and component relationships # 3. Check code quality and identify areas needing attention /sc:analyze --focus quality --format report # 🎯 Expected: HTML report with quality metrics, technical debt, and improvement areas # 4. Verify test coverage and quality /sc:test --coverage # 🎯 Expected: Test execution results with coverage percentages and missing test areas # 5. Generate onboarding documentation /sc:document --type guide "getting started with this project" # 🎯 Expected: Comprehensive getting started guide with setup instructions # 6. Save insights for future reference /sc:save --checkpoint "onboarding analysis complete" # 🎯 Expected: Session saved with all analysis insights and documentation ``` **💡 Why this works:** - `/sc:load --deep` activates comprehensive project analysis - Multiple analysis focuses provide complete understanding - Documentation generation creates permanent reference materials - Session persistence preserves insights for future use **⚠️ Gotchas:** - Large projects may take time for deep analysis - Test command requires existing test configuration - Documentation quality depends on project structure clarity --- ### Scenario 2: Security Vulnerability Investigation **Situation**: Security scan flagged potential vulnerabilities, need systematic investigation and remediation. **Step-by-step workflow:** ```bash # 1. Initialize focused security analysis /sc:analyze --focus security --depth deep # 🎯 Expected: Comprehensive security vulnerability assessment with severity ratings # 2. Investigate specific suspicious components /sc:troubleshoot "potential SQL injection in user queries" --type security --trace # 🎯 Expected: Systematic analysis of SQL injection vectors and vulnerable code patterns # 3. Analyze authentication and authorization systems /sc:analyze src/auth --focus security --format report # 🎯 Expected: Detailed auth security analysis with specific vulnerability details # 4. Apply security improvements /sc:improve auth-service --type security --safe # 🎯 Expected: Automatic application of security best practices and vulnerability fixes # 5. Validate security improvements with testing /sc:test --type security # 🎯 Expected: Security-focused test execution with validation of fixes # 6. Document security findings and remediation /sc:document --type report "security vulnerability assessment" # 🎯 Expected: Comprehensive security report with findings and remediation steps # 7. Save security analysis for compliance /sc:save --type security-audit "vulnerability remediation complete" # 🎯 Expected: Complete security audit trail saved for future reference ``` **💡 Why this works:** - Security-focused analysis activates Security Engineer agent automatically - Systematic troubleshooting provides comprehensive investigation methodology - Safe improvements apply fixes without breaking existing functionality - Documentation creates audit trail for compliance requirements **⚠️ Gotchas:** - Security analysis may flag false positives requiring manual review - Improvements should be tested thoroughly before production deployment - Complex security issues may require expert security engineer consultation --- ### Scenario 3: Performance Optimization Sprint **Situation**: Application performance has degraded, need systematic optimization across frontend and backend. **Step-by-step workflow:** ```bash # 1. Comprehensive performance baseline analysis /sc:analyze --focus performance --depth deep # 🎯 Expected: Performance bottleneck identification with specific metrics and recommendations # 2. Profile API performance issues /sc:troubleshoot "API response times degraded" --type performance # 🎯 Expected: Systematic analysis of API bottlenecks, database queries, and caching issues # 3. Optimize backend performance /sc:improve api-endpoints --type performance --interactive # 🎯 Expected: Performance engineer provides optimization recommendations with guided implementation # 4. Optimize frontend bundle and rendering /sc:improve src/components --type performance --safe # 🎯 Expected: Frontend optimization including code splitting, lazy loading, and rendering improvements # 5. Build optimized production artifacts /sc:build --type prod --optimize --verbose # 🎯 Expected: Optimized production build with minification, tree-shaking, and performance analysis # 6. Validate performance improvements with testing /sc:test --type performance --coverage # 🎯 Expected: Performance test execution with before/after metrics comparison # 7. Monitor and document optimization results /sc:reflect --type completion "performance optimization" # 🎯 Expected: Validation of optimization effectiveness with recommendations for monitoring # 8. Save optimization insights and metrics /sc:save --checkpoint "performance optimization sprint complete" # 🎯 Expected: Complete optimization documentation with metrics and ongoing monitoring recommendations ``` **💡 Why this works:** - Performance focus automatically activates Performance Engineer agent - Interactive improvements provide guided optimization decisions - Production build validation ensures optimizations work in deployment - Comprehensive testing validates improvement effectiveness **⚠️ Gotchas:** - Performance improvements may introduce subtle bugs requiring thorough testing - Production builds should be tested in staging environment first - Performance metrics should be monitored continuously after deployment --- ### Scenario 4: Legacy Code Modernization **Situation**: Large legacy codebase needs modernization to current standards and frameworks. **Step-by-step workflow:** ```bash # 1. Assess legacy codebase comprehensively /sc:load --deep --summary # 🎯 Expected: Complete legacy system analysis with technology stack assessment # 2. Identify modernization opportunities and technical debt /sc:analyze --focus architecture --depth deep # 🎯 Expected: Technical debt assessment with modernization recommendations and migration strategy # 3. Plan systematic modernization approach /sc:select-tool "migrate 100+ files to TypeScript" --analyze # 🎯 Expected: Tool selection recommendations for large-scale code transformation # 4. Begin with code quality improvements /sc:improve legacy-modules --type maintainability --preview # 🎯 Expected: Preview of maintainability improvements without applying changes # 5. Apply safe modernization improvements /sc:improve legacy-modules --type maintainability --safe # 🎯 Expected: Application of safe refactoring and modernization patterns # 6. Clean up technical debt systematically /sc:cleanup src/ --dead-code --safe # 🎯 Expected: Removal of dead code, unused imports, and outdated patterns # 7. Validate modernization with comprehensive testing /sc:test --type all --coverage # 🎯 Expected: Complete test suite execution with coverage analysis # 8. Document modernization progress and next steps /sc:document --type report "legacy modernization progress" # 🎯 Expected: Comprehensive modernization report with completed work and future recommendations # 9. Save modernization insights for iterative improvement /sc:save --checkpoint "legacy modernization phase 1" # 🎯 Expected: Complete modernization context saved for continued iterative improvement ``` **💡 Why this works:** - Deep analysis provides comprehensive understanding of legacy system complexity - Tool selection optimization ensures efficient modernization approach - Preview mode allows safe exploration of changes before application - Iterative approach with checkpoints enables manageable modernization process **⚠️ Gotchas:** - Large legacy systems require multiple iteration cycles - Preview changes carefully before applying to critical systems - Comprehensive testing essential to prevent breaking legacy functionality - Modernization should be planned in phases to manage risk --- ### Scenario 5: Multi-Team API Design **Situation**: Multiple teams need to collaborate on API design requiring coordination across frontend, backend, and security concerns. **Step-by-step workflow:** ```bash # 1. Brainstorm API requirements with stakeholder exploration /sc:brainstorm "multi-service API architecture" --strategy enterprise --depth deep # 🎯 Expected: Comprehensive requirements discovery with cross-team considerations # 2. Generate structured API implementation workflow /sc:workflow api-requirements.md --strategy systematic --parallel # 🎯 Expected: Detailed implementation plan with multi-team coordination and dependencies # 3. Design API architecture with security considerations /sc:design --type api user-management --format spec # 🎯 Expected: Formal API specification with security, performance, and integration considerations # 4. Implement API with multi-domain expertise /sc:implement user management API --type api --with-tests --safe # 🎯 Expected: Complete API implementation with automated testing and security validation # 5. Validate API design with cross-team testing /sc:test --type integration --coverage # 🎯 Expected: Integration testing with frontend/backend coordination validation # 6. Generate comprehensive API documentation /sc:document --type api src/controllers/ --style detailed # 🎯 Expected: Complete API documentation with usage examples and integration guidance # 7. Reflect on multi-team coordination effectiveness /sc:reflect --type completion "API design collaboration" # 🎯 Expected: Analysis of coordination effectiveness with recommendations for future collaboration # 8. Save API design insights for team knowledge sharing /sc:save --type collaboration "multi-team API design complete" # 🎯 Expected: Complete API design context saved for future multi-team projects ``` **💡 Why this works:** - Brainstorming mode facilitates cross-team requirements discovery - Workflow generation provides structured coordination approach - Multi-persona activation ensures comprehensive domain coverage - Documentation supports ongoing team collaboration **⚠️ Gotchas:** - Multi-team coordination requires clear communication channels - API design decisions should be validated with all stakeholder teams - Integration testing requires coordination of development environments - Documentation should be maintained as API evolves --- ## Troubleshooting Scenarios 🔧 ### Problem: Build Failures After Dependency Updates **Symptoms**: Build process failing with cryptic error messages after updating dependencies. **Troubleshooting workflow:** ```bash # 1. Systematic build failure investigation /sc:troubleshoot "TypeScript compilation errors" --type build --trace # 🎯 Expected: Systematic analysis of build logs and TypeScript configuration issues # 2. Analyze dependency compatibility /sc:analyze package.json --focus dependencies # 🎯 Expected: Dependency conflict analysis with compatibility recommendations # 3. Attempt automatic build fixes /sc:troubleshoot "build failing" --type build --fix # 🎯 Expected: Application of common build fixes with validation # 4. Clean build with optimization /sc:build --clean --verbose # 🎯 Expected: Clean build execution with detailed error analysis ``` **💡 Why this works:** Systematic troubleshooting provides structured diagnosis, automatic fixes handle common issues, verbose output reveals detailed error information. --- ### Problem: Authentication System Security Vulnerabilities **Symptoms**: Security scan revealed potential authentication vulnerabilities. **Troubleshooting workflow:** ```bash # 1. Deep security analysis of authentication system /sc:analyze src/auth --focus security --depth deep # 🎯 Expected: Comprehensive security vulnerability assessment with specific findings # 2. Investigate specific authentication vulnerabilities /sc:troubleshoot "JWT token vulnerability" --type security --trace # 🎯 Expected: Systematic analysis of JWT implementation with security recommendations # 3. Apply security hardening improvements /sc:improve auth-service --type security --safe # 🎯 Expected: Application of security best practices and vulnerability fixes # 4. Validate security fixes with testing /sc:test --type security auth-tests/ # 🎯 Expected: Security-focused testing with validation of vulnerability fixes ``` **💡 Why this works:** Security-focused analysis activates security expertise, systematic troubleshooting provides comprehensive investigation, safe improvements ensure no functionality breaks. --- ### Problem: Performance Degradation in Production **Symptoms**: Application response times increased significantly in production environment. **Troubleshooting workflow:** ```bash # 1. Performance bottleneck identification /sc:troubleshoot "API response times degraded" --type performance # 🎯 Expected: Systematic performance analysis with bottleneck identification # 2. Analyze performance across application layers /sc:analyze --focus performance --format report # 🎯 Expected: Comprehensive performance report with optimization recommendations # 3. Optimize critical performance paths /sc:improve api-endpoints --type performance --interactive # 🎯 Expected: Performance optimization with guided decision-making # 4. Validate performance improvements /sc:test --type performance --coverage # 🎯 Expected: Performance testing with before/after metrics comparison ``` **💡 Why this works:** Performance-focused troubleshooting provides systematic bottleneck analysis, interactive improvements guide complex optimization decisions, testing validates improvement effectiveness. --- ## Advanced Patterns 🎓 ### Pattern: Cross-Session Project Development **Use case**: Working on complex features across multiple development sessions with context preservation. ```bash # Session 1: Requirements and Planning /sc:load # Initialize project context /sc:brainstorm "user dashboard feature" --prd # Explore requirements /sc:workflow dashboard-requirements.md # Generate implementation plan /sc:save --checkpoint "dashboard planning" # Save planning context # Session 2: Implementation Start /sc:load # Resume project context /sc:implement dashboard component --type component --framework react /sc:save --checkpoint "dashboard component created" # Session 3: Testing and Refinement /sc:load # Resume project context /sc:test dashboard-component --coverage # Validate implementation /sc:improve dashboard-component --type quality --safe /sc:save --checkpoint "dashboard implementation complete" # Session 4: Integration and Documentation /sc:load # Resume project context /sc:reflect --type completion "dashboard feature" /sc:document --type component dashboard-component /sc:save "dashboard feature complete" ``` **💡 Why this works:** Session persistence maintains context across development cycles, checkpoints provide recovery points, progressive enhancement builds on previous work. --- ### Pattern: Multi-Tool Complex Analysis **Use case**: Complex system analysis requiring coordination of multiple specialized tools and expertise. ```bash # Step 1: Intelligent tool selection for complex task /sc:select-tool "comprehensive security and performance audit" --analyze # 🎯 Expected: Recommended tool combination and coordination strategy # Step 2: Coordinated multi-domain analysis /sc:analyze --focus security --depth deep & /sc:analyze --focus performance --depth deep & /sc:analyze --focus architecture --depth deep # 🎯 Expected: Parallel analysis across multiple domains # Step 3: Systematic troubleshooting with expert coordination /sc:troubleshoot "complex system behavior" --type system --sequential # 🎯 Expected: Structured debugging with multiple expert perspectives # Step 4: Comprehensive improvement with validation /sc:improve . --type quality --interactive --validate # 🎯 Expected: Guided improvements with comprehensive validation gates ``` **💡 Why this works:** Tool selection optimization ensures efficient approach, parallel analysis maximizes efficiency, expert coordination provides comprehensive coverage. --- ### Pattern: Large-Scale Code Transformation **Use case**: Systematic transformation of large codebase with pattern-based changes. ```bash # Step 1: Analyze scope and plan transformation approach /sc:select-tool "migrate 100+ files to TypeScript" --efficiency # 🎯 Expected: Optimal tool selection for large-scale transformation # Step 2: Systematic transformation with progress tracking /sc:spawn migrate-typescript --parallel --monitor # 🎯 Expected: Parallel transformation with progress monitoring # Step 3: Validate transformation quality and completeness /sc:test --type all --coverage /sc:analyze --focus quality transformed-files/ # 🎯 Expected: Comprehensive validation of transformation quality # Step 4: Cleanup and optimization post-transformation /sc:cleanup transformed-files/ --safe /sc:improve transformed-files/ --type maintainability --safe # 🎯 Expected: Final cleanup and optimization of transformed code ``` **💡 Why this works:** Scope analysis ensures appropriate tool selection, parallel processing maximizes efficiency, comprehensive validation ensures quality maintenance. --- ## Command Combinations That Work Well 🔗 ### Security-Focused Development Workflow ```bash # Analysis → Improvement → Validation → Documentation /sc:analyze --focus security --depth deep /sc:improve src/ --type security --safe /sc:test --type security --coverage /sc:document --type security-guide ``` ### Performance Optimization Workflow ```bash # Profiling → Optimization → Building → Validation /sc:analyze --focus performance --format report /sc:improve api/ --type performance --interactive /sc:build --type prod --optimize /sc:test --type performance ``` ### Quality Improvement Workflow ```bash # Assessment → Preview → Application → Cleanup → Testing /sc:analyze --focus quality /sc:improve src/ --type quality --preview /sc:improve src/ --type quality --safe /sc:cleanup src/ --safe /sc:test --coverage ``` ### New Feature Development Workflow ```bash # Planning → Implementation → Testing → Documentation → Session Save /sc:brainstorm "feature idea" --prd /sc:implement feature-name --type feature --with-tests /sc:test feature-tests/ --coverage /sc:document --type feature feature-name /sc:save --checkpoint "feature complete" ``` ### Legacy Code Modernization Workflow ```bash # Assessment → Planning → Safe Improvement → Cleanup → Validation /sc:load --deep --summary /sc:select-tool "legacy modernization" --analyze /sc:improve legacy/ --type maintainability --preview /sc:improve legacy/ --type maintainability --safe /sc:cleanup legacy/ --safe /sc:test --type all ``` --- ## Best Practices in Action 🌟 ### Effective Flag Usage Patterns **Safe Development Pattern:** ```bash # Always preview before applying changes /sc:improve src/ --preview # See what would change /sc:improve src/ --safe # Apply only safe changes /sc:test --coverage # Validate changes work ``` **Progressive Analysis Pattern:** ```bash # Start broad, then focus deep /sc:analyze . # Quick overview /sc:analyze src/auth --focus security --depth deep # Deep dive specific areas /sc:analyze --focus performance --format report # Detailed reporting ``` **Session Management Pattern:** ```bash # Initialize → Work → Checkpoint → Validate → Save /sc:load # Start session # ... work commands ... /sc:save --checkpoint "work in progress" # Regular checkpoints /sc:reflect --type completion "task name" # Validate completion /sc:save "task complete" # Final save ``` ### Expert Activation Optimization **Let auto-activation work:** ```bash # These automatically activate appropriate experts /sc:analyze src/auth --focus security # → Security Engineer /sc:implement user dashboard --framework react # → Frontend Architect + Magic MCP /sc:troubleshoot "API performance issues" # → Performance Engineer + Backend Architect /sc:improve legacy-code --type maintainability # → Architect + Quality Engineer ``` **Manual coordination when needed:** ```bash # Complex scenarios benefit from explicit tool selection /sc:select-tool "enterprise authentication system" --analyze /sc:brainstorm "multi-service architecture" --strategy enterprise /sc:workflow complex-feature.md --strategy systematic --parallel ``` ### Error Recovery Patterns **When commands don't work as expected:** ```bash # 1. Start with broader scope /sc:analyze src/component.js # Instead of very specific file /sc:troubleshoot "build failing" # Instead of specific error # 2. Use safe flags /sc:improve --safe --preview # Check before applying /sc:cleanup --safe # Conservative cleanup only # 3. Validate systematically /sc:reflect --type task "what I'm trying to do" # Check approach /sc:test --coverage # Ensure nothing broke ``` ### Performance Optimization **For large projects:** ```bash # Use focused analysis instead of analyzing everything /sc:analyze src/components --focus quality # Not entire project /sc:analyze api/ --focus performance # Specific performance focus # Use depth control /sc:analyze --depth quick # Fast overview /sc:analyze critical-files/ --depth deep # Deep dive where needed ``` **For resource constraints:** ```bash # Use efficient command combinations /sc:select-tool "complex operation" --efficiency # Get optimal approach /sc:spawn complex-task --parallel # Parallel processing /sc:save --checkpoint # Frequent saves to preserve work ``` --- ## Troubleshooting Command Issues 🔧 ### Common Command Problems and Solutions **"Command not working as expected":** ```bash # Try these diagnostic approaches /sc:index --search "keyword" # Find relevant commands /sc:select-tool "what you're trying to do" # Get tool recommendations /sc:reflect --type task "your goal" # Validate approach ``` **"Analysis taking too long":** ```bash # Use scope and depth control /sc:analyze src/specific-folder --depth quick # Narrow scope /sc:analyze --focus specific-area # Focus analysis /sc:analyze file.js # Single file analysis ``` **"Build commands failing":** ```bash # Systematic build troubleshooting /sc:troubleshoot "build issue description" --type build /sc:analyze package.json --focus dependencies /sc:build --clean --verbose # Clean build with details ``` **"Not sure which command to use":** ```bash # Command discovery /sc:index # Browse all commands /sc:index --category analysis # Commands by category /sc:index --search "performance" # Search by keyword ``` ### When to Use Which Approach **Quick tasks (< 5 minutes):** - Use direct commands: `/sc:analyze`, `/sc:build`, `/sc:improve` - Skip session management for one-off tasks - Use `--quick` depth for fast results **Medium tasks (30 minutes - 2 hours):** - Initialize with `/sc:load` - Use checkpoints: `/sc:save --checkpoint` - Use `--preview` before making changes - Validate with `/sc:reflect` **Long-term projects (days/weeks):** - Always use session lifecycle: `/sc:load` → work → `/sc:save` - Use `/sc:brainstorm` for requirements discovery - Plan with `/sc:workflow` for complex features - Regular reflection and validation **Emergency fixes:** - Start with `/sc:troubleshoot` for diagnosis - Use `--safe` flags for all changes - Test immediately: `/sc:test` - Document fixes: `/sc:document --type fix` --- ## Quick Reference Cheat Sheet 📝 ### Most Useful Commands ```bash /sc:load # Start session /sc:analyze . # Understand project /sc:implement feature-name # Build features /sc:improve messy-code # Clean up code /sc:troubleshoot "issue" # Debug problems /sc:build # Build project /sc:test --coverage # Test everything /sc:save # Save session ``` ### Best Flag Combinations ```bash --safe # Conservative changes only --preview # Show changes before applying --depth deep # Thorough analysis --focus security|performance|quality # Domain-specific focus --with-tests # Include testing --interactive # Guided assistance --format report # Generate detailed reports ``` ### Emergency Commands ```bash /sc:troubleshoot "critical issue" --fix # Emergency fixes /sc:analyze --focus security --depth deep # Security emergencies /sc:build --clean --verbose # Build emergencies /sc:reflect --type completion # Validate fixes work ``` ### Session Management ```bash /sc:load # Start/resume session /sc:save --checkpoint "description" # Save progress /sc:reflect --type completion # Validate completion /sc:save "final description" # End session ``` --- ## Remember: Learning Through Doing 🎯 **The SuperClaude Philosophy:** - **Start simple** - Try `/sc:analyze` or `/sc:implement` first - **Let auto-activation work** - SuperClaude picks experts for you - **Experiment freely** - Use `--preview` to see what would happen - **Progressive enhancement** - Start basic, add complexity as needed **Most important patterns:** 1. Initialize sessions: `/sc:load` 2. Save progress: `/sc:save --checkpoint` 3. Validate completion: `/sc:reflect` 4. Preview before applying: `--preview` flag 5. Use safe modes: `--safe` flag **Remember:** You don't need to memorize everything in this cookbook. SuperClaude is designed to be discoverable through use. Start with the Quick Examples section and experiment from there! --- ## Related Guides **🚀 Foundation Knowledge (Start Here)** - [Installation Guide](installation-guide.md) - Get SuperClaude set up first - [SuperClaude User Guide](superclaude-user-guide.md) - Understand the framework philosophy **📚 Deep Understanding (After Trying Examples)** - [Commands Guide](commands-guide.md) - Complete reference for all 21 commands - [Session Management Guide](session-management.md) - Master /sc:load and /sc:save workflows - [Agents Guide](agents-guide.md) - Understanding the 13 specialists behind the scenes **⚙️ Advanced Usage (When You Want Control)** - [Flags Guide](flags-guide.md) - Manual control and optimization flags - [Behavioral Modes Guide](behavioral-modes-guide.md) - How SuperClaude adapts automatically - [Best Practices Guide](best-practices.md) - Proven patterns for effective usage **🔧 When Examples Don't Work** - [Troubleshooting Guide](troubleshooting-guide.md) - Solutions for common command issues **🏗️ Technical Understanding (Optional)** - [Technical Architecture Guide](technical-architecture.md) - How the system works internally **📖 Learning Path Using This Cookbook:** 1. Try [Quick Examples](#quick-examples---just-try-these-) for immediate results 2. Follow [Development Scenarios](#development-scenarios-) for complete workflows 3. Use [Command Combinations](#command-combinations-that-work-well-) for your specific needs 4. Reference [Best Practices](#best-practices-in-action-) for optimization --- *Ready to start? Try `/sc:load` to initialize your session and pick any example that matches your current need! 🚀*